Skip to main content

Juvenile Justice Agencies

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20240805-80045-65

Submitted by Bryan Lee Dail on
Chat rooms, discussion forums, and VoIP, instant messaging, and social media platforms have been used to facilitate cyber-enabled fraud, such as the sale of stolen data, skimming, and BEC scams.? This webinar introduces participants to cyber-enabled fraud, types of cyber-enabled fraud, and the platforms used in the commission of these types of cybercrime.

20240805-80048-91

Submitted by Bryan Lee Dail on

This course will introduce law enforcement executives to the fundamental concepts necessary for establishing healthy cybersecurity practices in their organizations. With the increase in Internet-connected devices and as threats become more prevalent and dangerous, cybersecurity becomes an extremely vital function for organizational stability. As the leadership of a law enforcement organization, executives are charged with protecting organizational assets and creating a culture of cybersecurity-minded behavior.

20240805-80051-09

Submitted by Bryan Lee Dail on
Cybercrimes can and have been committed by organized criminal groups. This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.

20240805-80053-48

Submitted by Bryan Lee Dail on
What has not changed on the motor vehicle in over 125 years? If you answered, "The stamped metal license plate" you are correct! The digital license plate (DLP) of today can do so much more, and you can learn all about it on as we break down this new technology. Digital license plates are here with an array of features, including GPS, Bluetooth, RFID (radio frequency identification) and a cellular modem.

20240805-80056-15

Submitted by Bryan Lee Dail on
Cybercriminals in clearnet and darknet spaces often use tools like encrypted communication platforms in the commission of cybercrimes. This webinar introduces participants to various encrypted communication platforms and their use by online threat actors. Participants will gain technical knowledge of encrypted communication platforms and gain practical knowledge on how to conduct investigations that involve these platforms.

20240805-80059-66

Submitted by Bryan Lee Dail on
Expand your DFIR skills by diving into the world of malware analysis. In this webinar, you will learn essential techniques and strategies for incorporating malware analysis into your skillset, enabling you to effectively identify, analyze, and mitigate malicious software threats. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks. By participating, you will acquire hands-on experience, along with the knowledge and tools essential for fortifying your defense against malware attacks.

20240805-80101-94

Submitted by Bryan Lee Dail on
Join us for an essential conversation with two veteran law enforcement leaders as we explore the evolving challenges faced by law enforcement related to the ever-increasing amount, and complexity of digital evidence available in a typical investigation. Hear how agencies can adapt to keep pace with the constant digital expansion within law enforcement investigations. Do not miss the opportunity to participate in this important discussion. Presented by: Ashan M.

20240805-80125-97

Submitted by Bryan Lee Dail on
In 2011, FBI agents were concluding a routine liaison visit with officials at DuPont Pioneer's offices near Des Moines, Iowa when one of the agents asked if company officials had any unusual activity recently. Specifically, they were looking for anything that may involve targeting the company's intellectual property (IP). The company official subsequently detailed a recent incident where an Asian male had been found digging in one of their grower fields. Grower fields operate like laboratories where companies can test their products.

20240805-80104-35

Submitted by Bryan Lee Dail on
This course presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

20240805-80123-81

Submitted by Bryan Lee Dail on
Just a mile away from the Pottawattamie County Sheriffs Office in Council Bluffs, Iowa, a woman is shot during a nighttime stroll in a public park. It is the latest in a bizarre series of events, three years into a five-year missing persons investigation. Closing the case will take years of work, dozens of search warrants, and two weeks of testimony. This presentation will provide a case study of the investigation and prosecution of a no-body homicide.
Subscribe to Juvenile Justice Agencies